Вы находитесь на странице: 1из 1

TRUE

1. Computer viruses usually spread throughout the system before being detected
2. A worm is software program that replicates itself in areas of idle memory until the system fails.
3. The most frequent victims of program viruses are microcomputers
4. Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes
and event-oriented logs.
5. In a telecommunications environment, line errors can be detected by using an echo check.
6. The message authentication code is calculated by the sender and the receiver of a data transmission.
7. The request-response technique should detect if a data communication transmission has been diverted.
8. A value added network can detect and reject transactions by unauthorized trading partners.
9. Electronic data interchange customers may be given access to the vendor's data files.
10. The audit trail for electronic data interchange transactions is stored on magnetic media.
11. To preserve audit trails in a computerized environment, transaction logs are permanent records of transactions.
12. Examining programmer authority tables for information about who has access to Data Definition Language commands
will provide evidence about who is responsible for creating subschemas.
13. The network paradox is that networks exist to provide user access to shared resources while one of its most important
objectives is to control access.
14. IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
15. The rules that make it possible for users of networks to communicate are called protocols.
16. A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of
negative publicity
17. Because of network protocols, users of networks built by different manufacturers are able to communicate and share
data.
18. The bus topology connects the nodes in parallel.
19. A network topology is the physical arrangement of the components of the network.
20. A bus topology is less costly to install than a ring topology.
21. In a hierarchical topology, network nodes communicate with each other via a central host computer.
22. Polling is one technique used to control data collisions
23. intermediary in a smurf attack is also a victim
24. A ping is used to test the state of network congestion and determine whether a particular host computer is connected
and available on the network.
25. A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a
particular host computer
FALSE
1. In a computerized environment, the audit trail log must be printed onto paper documents.
2. Disguising message packets to look as if they came from another user and to gain access to the hosts network is called
spooling.
3. A formal log-on procedure is the operating systems last line of defense against unauthorized access.
4. Viruses rarely attach themselves to executable files
5. Operating system controls are of interest to system professionals but should not concern accountants and auditors.
6. Operating system integrity is not of concern to accountants because only hardware risks are involved.
7. Firewalls are special materials used to insulate computer facilities
8. Electronic data interchange translation software interfaces with the sending firm and the value added network.
9. A firewall is a hardware partition designed to protect networks from power surges.
10. The standard format for an e-mail address is DOMAIN NAME@USER NAME.
11. Cookies are files created by user computers and stored on Web servers
12. The client-server model can only be applied to ring and star topologies.
13. Only two types of motivation drive DoS attacks: 1) to punish an organization with which the perpetrator had a
grievance; and 2) to gain bragging rights for being able to do it.
14. A distributed denial of service (DDoS) attack may take the form of a SYN flood but not a smurf attack.
15. A digital signature is a digital copy of the senders actual signature that cannot be forged.
16. A smurf attack involves three participants: a zombie, an intermediary, and the victim.
17. The more individuals that need to exchange encrypted data, the greater the chance that the key will become known to
an intruder. To overcome this problem, private key encryption was devised.
18. HTML tags are customized to delimit attributes, the content of which can be read and processed by computer
applications.

Вам также может понравиться